Google Zanzibar, SpiceDB, Ory Keto, OpenFGA, Open Policy Agent, OSO, and AWS Cedar are examples. Graph-based authorization systems employ a graphical representation to illustrate relationships between users and resources. They excel at mapping hierarchies and nested relationships, offering a natural avenue for Relationship-based Access Control.
Table of contents
IntroductionGraph-Based Authorization SystemsPolicy as Code Authorization SystemsWeighing the Pros and ConsDeciding Factor: Scale vs. ComplexityWhy Not Both?ConclusionSort: